Securing Cislunar Missions: A Location-Based Authentication Approach

被引:1
|
作者
Benchoubane, Nesrine [1 ]
Donmez, Baris [1 ]
Ben Yahia, Olfa [1 ]
Kurt, Gunes Karabulut [1 ]
机构
[1] Polytech Montreal, Poly Grames Res Ctr, Dept Elect Engn, Montreal, PQ, Canada
关键词
Authentication; cislunar; satellite network; physical layer security; location estimation;
D O I
10.23919/3S60530.2024.10592290
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the evolution of next-generation communication networks proceeds, several wireless devices gain access to such networks, and the amount of transmitted data is rapidly increasing. Yet, with more and more critical data requiring confidential transmission and protection on the network, the security risks for wireless communications networks are even more significant. Considering the fixed-trajectory nature of satellites orbiting the Earth, it is worth investigating how this invariant can be leveraged to ensure security and reliability. In this paper, we propose a location-based authentication framework for cislunar space with distance verification to realize secure authentication. Expanding on this foundation, this study proposes tolerance variations based on relative orbital positions and noise sources in space. In addition, we performed Monte Carlo simulations under the assumption of noisy propagation conditions, providing a robust evaluation of the proposed framework's performance in diverse and challenging lunar communication scenarios.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A New Approach in a Multifactor Authentication and Location-based Authorization
    Jaros, David
    Bednar, Petr
    Radek, Kuchta
    ICIMP 2011: THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET MONITORING AND PROTECTION, 2011, : 50 - 53
  • [2] An Authentication Approach for Multiple-User Location-Based Queries
    Wang, Yong
    Hassan, Abdelrhman
    Duan, Xiaoran
    Yang, Xiaodong
    Zhang, Yiquan
    Zhang, Xiaosong
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 256 - 270
  • [3] A Tale of Location-Based User Authentication
    Falk, Eric
    Toth, Vendel
    Knaff, Alexandre
    State, Radu
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2019, : 440 - 443
  • [4] The Location-based Authentication with The Active Infrastructure
    Jaros, David
    Kuchta, Radek
    Vrba, Radimir
    PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2011), 2011, : 228 - 230
  • [5] Securing sensor networks with location-based keys
    Zhang, WC
    Liu, W
    Lou, WJ
    Fang, YG
    2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1909 - 1914
  • [6] Location-based Anonymous Authentication for Vehicular Communications
    Biswas, Subir
    Misic, Jelena
    2011 IEEE 22ND INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2011, : 1213 - 1217
  • [7] Location-based Risk Assessment for Mobile Authentication
    Hintze, Daniel
    Scholz, Sebastian
    Koch, Eckhard
    Mayrhofer, Rene
    UBICOMP'16 ADJUNCT: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING, 2016, : 85 - 88
  • [8] A Location-Based Authentication System Leveraging Smartphones
    Albayram, Yusuf
    Khan, Mohammad Maifi Hasan
    Bamis, Athanasios
    Kentros, Sotirios
    Nhan Nguyen
    Jiang, Ruhua
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM), VOL 1, 2014, : 83 - 88
  • [9] A location-based naming mechanism for securing sensor networks
    Zhou, Yun
    Fang, Yuguang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (03): : 347 - 355
  • [10] Securing critical infrastructures with location based authentication blockchain
    Noble, Michael
    Wang, Zhaohong
    SENSORS AND SMART STRUCTURES TECHNOLOGIES FOR CIVIL, MECHANICAL, AND AEROSPACE SYSTEMS 2019, 2019, 10970